(1)
An Approach to Conceal Honeypot from Attacker. IJARCS 2017, 3 (7), 290-296. https://doi.org/10.26483/ijarcs.v3i7.1397.